Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tildeslash monit vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2022-26563
An issue exists in Tildeslash Monit prior to 5.31.0, allows remote malicious users to gain escilated privlidges due to improper PAM-authorization.
Tildeslash Monit
383
VMScore
CVE-2019-11454
Persistent cross-site scripting (XSS) in http/cervlet.c in Tildeslash Monit prior to 5.25.3 allows a remote unauthenticated malicious user to introduce arbitrary JavaScript via manipulation of an unsanitized user field of the Authorization header for HTTP Basic Authentication, wh...
Mmonit Monit
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Canonical Ubuntu Linux 18.10
Canonical Ubuntu Linux 19.04
Fedoraproject Fedora 31
Fedoraproject Fedora 32
490
VMScore
CVE-2019-11455
A buffer over-read in Util_urlDecode in util.c in Tildeslash Monit prior to 5.25.3 allows a remote authenticated malicious user to retrieve the contents of adjacent memory via manipulation of GET or POST parameters. The attacker can also cause a denial of service (application out...
Tildeslash Monit
Debian Debian Linux 8.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Canonical Ubuntu Linux 18.10
Canonical Ubuntu Linux 19.04
445
VMScore
CVE-2019-11393
An issue exists in /admin/users/update in M/Monit prior to 3.7.3. It allows unprivileged users to escalate their privileges to an administrator by requesting a password change and specifying the admin parameter.
Tildeslash Monit
445
VMScore
CVE-2004-1899
The administration interface in Monit 1.4 up to and including 4.2 allows remote malicious users to cause an off-by-one overflow via a POST that contains 1024 bytes.
Tildeslash Monit 4.1
Tildeslash Monit 4.1.1
Tildeslash Monit 3.0
Tildeslash Monit 3.1
Tildeslash Monit 1.4
Tildeslash Monit 4.2
Tildeslash Monit 4.3 Beta 2
Tildeslash Monit 3.2
Tildeslash Monit 4.0
1000
VMScore
CVE-2004-1898
Stack-based buffer overflow in the administration interface in Monit 1.4 up to and including 4.2 allows remote malicious users to execute arbitrary code via a long username.
Tildeslash Monit 4.2
Tildeslash Monit 4.3 Beta 2
Tildeslash Monit 3.2
Tildeslash Monit 4.0
Tildeslash Monit 1.4
Tildeslash Monit 3.0
Tildeslash Monit 3.1
Tildeslash Monit 4.1
Tildeslash Monit 4.1.1
1 EDB exploit
1000
VMScore
CVE-2003-1083
Stack-based buffer overflow in Monit 1.4 to 4.1 allows remote malicious users to execute arbitrary code via a long HTTP request.
Tildeslash Monit 2.0
Tildeslash Monit 2.1
Tildeslash Monit 2.4.3
Tildeslash Monit 3.0
Tildeslash Monit 1.4
Tildeslash Monit 1.4.1
Tildeslash Monit 2.4.1
Tildeslash Monit 2.4.2
Tildeslash Monit 2.1.1
Tildeslash Monit 2.2
Tildeslash Monit 3.1
Tildeslash Monit 3.2
Tildeslash Monit 2.2.1
Tildeslash Monit 2.3
Tildeslash Monit 2.4
Tildeslash Monit 4.0
Tildeslash Monit 4.1
2 EDB exploits
445
VMScore
CVE-2003-1084
Monit 1.4 to 4.1 allows remote malicious users to cause a denial of service (daemon crash) via an HTTP POST request with a negative Content-Length field.
Tildeslash Monit 1.4.1
Tildeslash Monit 2.0
Tildeslash Monit 2.4.1
Tildeslash Monit 2.4.2
Tildeslash Monit 1.4
Tildeslash Monit 2.3
Tildeslash Monit 2.4
Tildeslash Monit 4.1
Tildeslash Monit 2.1
Tildeslash Monit 2.1.1
Tildeslash Monit 2.4.3
Tildeslash Monit 3.0
Tildeslash Monit 3.1
Tildeslash Monit 2.2
Tildeslash Monit 2.2.1
Tildeslash Monit 3.2
Tildeslash Monit 4.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started